Thales e-security Key Isolation for Enterprises and Managed Service Providers

Size: px
Start display at page:

Download "Thales e-security Key Isolation for Enterprises and Managed Service Providers"

Transcription

1 Thales e-security Key Isolation for Enterprises and Managed Service Providers Technical White Paper May 2015

2 Contents 1. Introduction 1. Introduction Business Models Security World Protecting keys ACLs Policy Enforcement Conclusion... 9 nshield is a family of multi-purpose HSMs that provide a trusted environment for secure cryptographic processing, key protection and key management. Cryptographic keys within an enterprise are used to identify people and machines, secure internal and external communications, encrypt and tokenize data at rest, sign messages and documents as well as other use cases. It is therefore vital for any business with a reliance on cryptographic keys to have assurances and enforceable policies surrounding key usage. The nshield family of Hardware Security Modules (HSMs) provides the ability to achieve that level of assurance. By using the Security World key management framework, supported by the nshield HSM family, an organization can create for itself a structured key infrastructure that meets the dynamic and fluid demands and requirements of today. This paper demonstrates how it is possible to easily configure Security World to define a framework which permits both partitioning and multi-tenancy cryptographic key isolation strategies. page Thales e-security, Inc. All rights reserved. page 3

3 2. Business Models 3. Security World Key isolation is often a requirement in both enterprise and managed service or cloud environments. There are two different business models which have a requirement for some form of partitioning with regards to their cryptographic resources estate: Enterprise customers who have a requirement to share cryptographic infrastructure resources between applications or departments within that same enterprise. Keys should be separated to preserve the necessary isolation between applications. Managed service providers who wish to divide a given cryptographic resource between any number of distinct and independent clients such that keys for one client are not accessible by another client. This paper addresses both models, and shows just how easy it is to design, implement and enforce a policy that meets their requirements. In addition to the requirements of the business model are a number of factors to consider when assessing techniques for partitioning: Object Types: Usually users, applications, or keys. Scale: This can range from one or two enterprise users or applications to millions of keys or customers. Thales Security World addresses the age old challenge of providing strong protection for keys while at the same time ensuring they are available for use by authorized applications that are deployed over high scale, redundant and distributed server To understand the ways in which Thales nshield HSMs can be deployed to support flexible isolation environments, we first need to have a clearer understanding of some Thales Security World architecture principles. To alleviate the developer from the burden of creating a key infrastructure, Thales provides the Security World architecture which is a simple, yet flexible key architecture that can be used to contain application keys, protected in a variety of ways while also providing easy to use load-balancing and disaster recovery functionality. Thales also provides industry standard APIs such as PKCS#11 and JCE based on the Security World architecture. It is assumed when using nshield HSMs that users are utilizing this standard key infrastructure whether integrating with existing standard interfaces or bespoke applications. Security World Key A Security: What determines the true level of security? What authentication policies are protecting application key material? How are physical security controls mapped to logical controls, and vice-versa. HSM A Accessibility: What access does the hosting organization have to customers material? Within an enterprise a provider may want to provide a super-user or an administrative quorum with access to all the keys. However customers will have more trust in a public service if the provider can t access their keys. Key B With all these factors in mind, how can Thales nshield HSMs assist in the development of isolated systems for the control of keys? HSM B Key C Figure 1 - Security World as a single security domain for HSMs and application keys Practically speaking a Security World creates a single security domain for keys and objects to be securely managed that can encompass many HSMs and clients. However, an HSM can only ever be configured with a single Security World at any one time. page Thales e-security, Inc. All rights reserved. page 5

4 3.1. When generating an application key within Security World on a Thales nshield HSM, it is important that the raw key material be protected by the certified hardware of the module at all times. It is also important that the key can be loaded by authorized clients and backed up in accordance with industry best practice guidelines. The Thales Security World provides mechanisms whereby the raw application key material and various meta-data about how the key can be used -- the Access Control List (ACL) -- are cryptographically wrapped using Security World foundation keys, specifically a key called the module key (KM0). The wrapped application key can then be stored on all authorized HSM clients so that they can load the key at a later date, and can also be backed up onto recovery media since the process involves encrypting the raw key data with keys that are only available on an nshield HSM in the correct Security World. Since these wrapped application keys exist on the storage media on the authorized clients, the volume of keys that a Security World can protect is only limited by the size of the storage medium on the host, not some feature or limitation of the HSM. This neatly addresses the topic of scale in relation to isolation principles Protecting the use of keys Where controls need to be implemented for the safeguarding of application keys, Operator Card Sets (OCS) or Softcards (passphrases) can be used to authorize the loading of those keys. Physical OCS and logical softcards are collectively referred to as authentication tokens. An authentication token is associated with an application key when the application key is generated. The application key then requires the authentication token to be presented and validated before the key can be loaded onto an HSM. Once an application key has been loaded into an HSM, it can be used (ACL permitting) as often as required for approved cryptographic operations before then being programmatically or automatically unloaded. A single authentication token can be used to protect multiple application keys Softcards keys are, by default, protected by the KM0 wrapping process, however sometimes it will be necessary to implement additional security controls to ensure an application presents some form of authorization before the HSM legitimately loads the key for use. The single-factor authorization model adopted by Security World is Softcards. page 6 Softcards are really nothing more than a single passphrase, but where physical access to a smart card slot is impractical Softcards can be a practical solution to enforcing some control over when an application key is loaded OCS Quorums nshield HSMs use smart cards to provide two-factor authorization, however an OCS is not a single smart card (although it could be). An OCS is normally a set of smart cards which represent an authorized group. When created, the necessary quorum of these cards is also set. This is the number of cards from the total set that need to be presented in order to authorize the use of the keys protected by the cardset. Since individual cards are normally allocated to authorized members of a group of users (each smart card with a unique passphrase), when a cardset is authorized within the HSM, this does not represent a single user s authorization, but rather the authorization of the group to perform the requested action. The notation used to describe the quorum of the cardset is K of N, where N is the total number of card in the cardset and K (K>0) is the number of cards required to form a quorum (N>0, N<=K). So in a 2 of 5 OCS, there are 5 cards in total but only 2 of this set need to be presented to permit the loading of a key. A special property of a 1 of N OCS is that obviously only a single card need be presented (along with its passphrase). This means that no physical switching of cards in slots needs to take place which can be a practical advantage in certain conditions where you not only want to protect where an application key is loaded, but still also want to retain the Softcard advantage of restricting when it is loaded. Though this is perhaps an inferior configuration to a K of N OCS where K>1 in terms of security over availability ACLs The Access Control List (ACL) forms a significant part of the meta-data associated with a key. It is securely wrapped along with the key when the key is generated, and is protected to the same high standards as the key itself. The ACL for a given key describes what authorizations are required for a specific operation to be performed, such as other keys or tokens that should be loaded, and what other limitations are applied to the key once it is loaded (such as time-outs and number of permitted operations). Security World avoids the need for expensive backup tokens and manual key cloning. An ACL can describe a very simple scenario whereby a key can be used to encrypt and decrypt data, or can describe very complex hierarchies of keys which must be loaded (using their respective authentication tokens) before selected operations can be carried out. These ACL policies are all managed, unwrapped and enforced by the HSM natively, and as such cannot be compromised by an attacker. The ACL for a key is set when the key is generated and is not normally modifiable after that Thales e-security, Inc. All rights reserved. page 7

5 4. Policy Enforcement The concepts of Security World ACLs, OCS Quorums and Softcards are tightly bound together, and can be used in combination or isolation to meet even the most demanding security requirements or policies for a given application. With this in mind, we can now see that a key loading and usage policy is enforced by three factors: Access to the application key token If you don t have the application key token on your application server you simply cannot load that key onto a target HSM. This policy is enforced outside the HSM, by careful and deliberate synchronization of specific application across the application server estate. Token Authorization If a key is protected by an Authorizing token, such as a Softcard or an OCS, then you must present that token before you are then permitted to load the key into the HSM. This policy is enforced inside the HSM. Access Control Lists (ACL) Once the key is loaded, the key can only then be used for specific purposes and under specific conditions described in the ACL that is bundled in the application key token. Again, this policy is enforced inside the HSM. So how can these properties be used to construct an isolated security environment for our example business models of the Enterprise and the Managed Service Provider who require isolation between applications or customers? In both cases you can use individual or combinations of the following strategies:- 1) Restrict the replication of application to only those hosts that require access to use a specific application key. 2) Leverage one of the authorization token techniques (Softcard or OCS) to control when and where an application key is loaded. 3) Programmatically manipulate the ACL of a target application key token to restrict where, when and how the key can be used. By defining a policy as a combination of these strategies, you can then apply different policies to groups of application keys. It is then clear to see how Security World can not only meet a static security environment, but also one where several opposing security policies can co-exist on the same HSM or groups of HSMs. The ACL associated with an Key defines the key policy in a form an nshield HSM can strongly enforce. page Thales e-security, Inc. All rights reserved. page 9

6 5. Conclusion As previously described, there is a high degree of flexibility in the Thales Security World key management architecture which creates a fluid fit with enterprise or managed service requirements for multi-tenancy or partitioning. The nshield HSM hardware provides a safe place where keys can be loaded and used. One of the core strengths of the Security World architecture is that application are stored in an armoured format on application servers free from the confines of any particular HSM. So deciding where the application are and are not available is really the initial factor one should define when designing a framework for partitioning. By abstracting Keys, the size of the pool of available HSMs can be tuned dynamically to satisfy changing performance requirements without the need to clone application keys between HSMs. Module Protected More availability Less enforcement Softcard Protected 1 of N OCS Protected Less availability More enforcement K of N OCS Protected Figure 3 - Degrees of Availability and Enforcement via Authorizing Tokens The design and implementation of your HSM key management policies and architecture are based on your organizational needs and the balance of requirements between the need for accessibility to keys for high volume or automated usage and the security controls defining key usage that might be required by certain high assurance situations. Security World offers several flexible and mutually exclusive mechanisms to assist in this design and implementation of such an architecture. For more details about the Security World architecture, visit Figure 2 stored on hosts It is therefore better to instead conceptualize the partitioning problem less as one about containerizing the HSM, since policy enforcement of key loading and use is already trusted, but more about how the ACLs and authorization tokens are configured with application keys and most importantly how those tokens are distributed and made available to individual application hosts. page Thales e-security, Inc. All rights reserved. page 11

7 About Thales e-security Thales e-security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range markets including financial services, high technology, manufacturing and government. Thales e-security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. Follow us on: Thales e-security May 2015 PLB5024 Americas Thales e-security Inc. 900 South Pine Island Road, Suite 710, Plantation, FL USA Tel: or Fax: [email protected] page Asia Pacific 12 Thales Transport & Security (HK) Lt, Unit , 41/F, Sunlight Tower, 248 Queen s Road East, Wanchai, Hong Kong Tel: Fax: [email protected] Europe, Middle East, Africa Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ Tel:+44 (0) Fax:+44 (0) [email protected]

nshield Modules Integration Guide for Oracle Database 11g Release 2 Transparent Data Encryption

nshield Modules Integration Guide for Oracle Database 11g Release 2 Transparent Data Encryption nshield Modules Integration Guide for Oracle Database 11g Release 2 Transparent Data Encryption Version: 2.0 Date: 01 November 2013 Copyright 2013 Thales e-security Limited. All rights reserved. Copyright

More information

Thales nshield HSM. ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2. www.thales-esecurity.com

Thales nshield HSM. ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2. www.thales-esecurity.com Thales nshield HSM ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2 www.thales-esecurity.com Version: 1.0 Date: 11 June 2012 Copyright 2012 Thales e-security Limited. All rights

More information

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved. ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright

More information

Thales e-security Financial and Operational Benefits of using Datacryptor R4.02 in your network

Thales e-security Financial and Operational Benefits of using Datacryptor R4.02 in your network www.thales-esecurity.com Thales e-security Financial and Operational Benefits of using Datacryptor R4.02 in your network How do you currently manage your key updates for your crypto networks? How much

More information

Integration Guide Microsoft Internet Information Services (IIS) 7.5 Windows Server 2008 R2

Integration Guide Microsoft Internet Information Services (IIS) 7.5 Windows Server 2008 R2 Integration Guide Microsoft Internet Information Services (IIS) 7.5 Windows Server 2008 R2 Version: 1.0 Date: 12 October 2010 Copyright 2010 Thales ncipher Corporation Ltd. All rights reserved. These installation

More information

ncipher modules Integration Guide for Microsoft Windows Server 2008 Active Directory Certificate Services Windows Server 2008 32-bit and 64-bit

ncipher modules Integration Guide for Microsoft Windows Server 2008 Active Directory Certificate Services Windows Server 2008 32-bit and 64-bit ncipher modules Integration Guide for Microsoft Windows Server 2008 Active Directory Certificate Services Windows Server 2008 32-bit and 64-bit Version: 1.8 Date: 05 March 2010 Copyright 2010 ncipher Corporation

More information

ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com

ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com Version: 1.0 Date: 30 May 2012 Copyright 2012 Thales e-security Limited. All rights reserved.

More information

Thales Database Security Option Pack. for Microsoft SQL Server Integration Guide. www.thales-esecurity.com

Thales Database Security Option Pack. for Microsoft SQL Server Integration Guide. www.thales-esecurity.com Thales Database Security Option Pack for Microsoft SQL Server Integration Guide www.thales-esecurity.com Version: 2.0 Date: 4 May 2012 Copyright 2012 Thales e-security Limited. All rights reserved. Copyright

More information

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g

More information

Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices

Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices > Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices WHITE PAPER November 2011 www.thales-esecurity.com TABLE OF CONTENTS THE

More information

ncipher Modules Integration Guide for Apache HTTP Server www.thalesgroup.com/iss

ncipher Modules Integration Guide for Apache HTTP Server www.thalesgroup.com/iss ncipher Modules Integration Guide for Apache HTTP Server www.thalesgroup.com/iss Version: 1.3 Date: 19 August 2011 Copyright 2011 Thales e-security Limited. All rights reserved. Copyright in this document

More information

Secure SSL, Fast SSL

Secure SSL, Fast SSL Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Overview of Luna High Availability and Load Balancing

Overview of Luna High Availability and Load Balancing SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby

More information

Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities

Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities www.thales-esecurity.com Thales e-security Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Author: Mark B. Cooper White Paper June 2014 Contents Foreword... 2 Introduction....

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

Thales nshield HSM. Integration Guide for ISC BIND DNSSEC. www.thalesgroup.com/iss

Thales nshield HSM. Integration Guide for ISC BIND DNSSEC. www.thalesgroup.com/iss Thales nshield HSM Integration Guide for ISC BIND DNSSEC www.thalesgroup.com/iss Version: 1.1 Date: 15 June 2011 Copyright 2011 Thales e-security Limited. All rights reserved. Copyright in this document

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS

COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS As cloud adoption continues to rise, so has the demand from Service Providers for software products that support their multi-tenant

More information

Microsoft AD CS and OCSP Integration Guide. Microsoft Windows Server 2008 R2

Microsoft AD CS and OCSP Integration Guide. Microsoft Windows Server 2008 R2 Microsoft AD CS and OCSP Integration Guide Microsoft Windows Server 2008 R2 Version: 1.2 Date: 15 August 2013 Copyright 2013 Thales e-security Limited. All rights reserved. Copyright in this document is

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Implementing a Microsoft SQL Server 2005 Database

Implementing a Microsoft SQL Server 2005 Database This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Advanced Service Desk Security

Advanced Service Desk Security Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Course Outline Module 1: Designing a Database Server Infrastructure This module explains how to design an appropriate database server

More information

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Citrix GoToAssist Service Desk Security

Citrix GoToAssist Service Desk Security Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. 2 Many service

More information

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Data Protection and Mobile Payments. Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security

Data Protection and Mobile Payments. Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security Data Protection and Mobile Payments Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security 2 Today s reality It s a data-centric world. And the data is

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Course 20465C: Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements

More information

Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Mirjam van Olst. Best Practices & Considerations for Designing Your SharePoint Logical Architecture

Mirjam van Olst. Best Practices & Considerations for Designing Your SharePoint Logical Architecture Mirjam van Olst Best Practices & Considerations for Designing Your SharePoint Logical Architecture About me http://sharepointchick.com @mirjamvanolst [email protected] Agenda Introduction Logical Architecture

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Key Management Best Practices

Key Management Best Practices White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module

Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module This is a joint ncipher and IdentIT authored whitepaper Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module Abstract This paper discusses the benefits that are unique to

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

Certificate Management

Certificate Management Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Active Directory Services with Windows Server

Active Directory Services with Windows Server Course 10969B: Active Directory Services with Windows Server Course Details Course Outline Module 1: Overview of Access and Information Protection This module provides an overview of multiple Access and

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

e-authentication guidelines for esign- Online Electronic Signature Service

e-authentication guidelines for esign- Online Electronic Signature Service e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Active Directory Services with Windows Server

Active Directory Services with Windows Server Course 10969B: Active Directory Services with Windows Server Page 1 of 8 Active Directory Services with Windows Server Course 10969B: 4 days; Instructor-Led Introduction Get Hands on instruction and practice

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

ADVANCING SECURITY IN STORAGE AREA NETWORKS

ADVANCING SECURITY IN STORAGE AREA NETWORKS WHITE PAPER ADVANCING SECURITY IN STORAGE AREA NETWORKS Brocade Secure Fabric OS provides a reliable framework for enhancing security in mission-critical SAN environments As organizations continue to broaden

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Advanced virtualization management for Hyper-V and System Center environments. www.citrix.com

Advanced virtualization management for Hyper-V and System Center environments. www.citrix.com Advanced virtualization management for Hyper-V and System Center environments www.citrix.com Introduction Microsoft Hyper-V provides a dynamic, reliable and scalable virtualization platform enabling cost

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Building a better branch office. www.citrix.com

Building a better branch office. www.citrix.com Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.

More information

efolder White Paper: HIPAA Compliance

efolder White Paper: HIPAA Compliance efolder White Paper: HIPAA Compliance October 2014 Copyright 2014, efolder, Inc. Abstract This paper outlines how companies can use certain efolder services to facilitate HIPAA and HITECH compliance within

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies. It describes how

More information

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved. Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat

More information

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Server Virtualization with Windows Server Hyper-V and System Center

Server Virtualization with Windows Server Hyper-V and System Center Course 20409 : Server Virtualization with Windows Server Hyper-V and System Center Page 1 of 8 Server Virtualization with Windows Server Hyper-V and System Center Course 20409: 4 days; Instructor-Led Introduction

More information

TPM Key Backup and Recovery. For Trusted Platforms

TPM Key Backup and Recovery. For Trusted Platforms TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents

More information

[email protected] [email protected]

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Course 20465: Designing a Data Solution with Microsoft SQL Server

Course 20465: Designing a Data Solution with Microsoft SQL Server Course 20465: Designing a Data Solution with Microsoft SQL Server Overview About this course The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure

More information

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Page 1 of 6 Designing a Data Solution with Microsoft SQL Server Course 20465C: 4 days; Instructor-Led Introduction The focus of this four-day

More information

TOP SECRETS OF CLOUD SECURITY

TOP SECRETS OF CLOUD SECURITY TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

The Benefits of Virtualizing

The Benefits of Virtualizing T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

SQL Azure vs. SQL Server

SQL Azure vs. SQL Server SQL Azure vs. SQL Server Authors Dinakar Nethi, Niraj Nagrani Technical Reviewers Michael Thomassy, David Robinson Published April 2010 Summary SQL Azure Database is a cloud-based relational database service

More information

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

Configuring and Administering Microsoft SharePoint 2010

Configuring and Administering Microsoft SharePoint 2010 Course 10174 : Configuring and Administering Microsoft SharePoint 2010 Page 1 of 7 Configuring and Administering Microsoft SharePoint 2010 Course 10174: 4 days; Instructor-Led Introduction This four-day

More information

Active Directory Services with Windows Server MOC 10969

Active Directory Services with Windows Server MOC 10969 Active Directory Services with Windows Server MOC 10969 Course Outline Module 1: Overview of Access and Information Protection This module explains Access and Information Protection (AIP) solutions from

More information

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Integration Guide. Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules. Windows Server 2008 (32-bit and 64-bit)

Integration Guide. Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules. Windows Server 2008 (32-bit and 64-bit) Integration Guide Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules Windows Server 2008 (32-bit and 64-bit) These installation instructions are intended to provide step-by-step instructions

More information